PART ICASING THE ESTABLISHMENT

Case Study: Is There Really Any SIP in the Internet?

Voice over IP (VoIP) and unified communications (UC) have many security issues—some unique and others shared with other network applications. Some security issues can be exploited from public networks, whereas others can only be exploited if the attacker has internal access. When we wrote the first version of this book, the majority of issues required internal access. UC is now more commonly used across the public network, and this network has become much more hostile. Part I of this book introduces the most significant UC threats and attacks, and then covers the processes of footprinting, scanning, and enumeration, which are used to gather information necessary ...

Get Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.